


default search action
Jinyue Xia
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j26]Xi Huang, Shibin Zhang, Chen Lin, Jinyue Xia:
Quantum Fuzzy Support Vector Machine for Binary Classification. Comput. Syst. Sci. Eng. 45(3): 2783-2794 (2023) - 2022
- [j25]Lei Ren, Jing Hu, Mei Li, Ling Zhang, Jinyue Xia:
Structured Graded Lung Rehabilitation for Children with Mechanical Ventilation. Comput. Syst. Sci. Eng. 40(1): 139-150 (2022) - [j24]Baiqing Zhou, Na Li, Duan Lu, Jinyue Xia:
Correlation Analysis between Economic Growth and Environmental Quality. Comput. Syst. Sci. Eng. 41(1): 127-140 (2022) - [j23]Hao Yan, Yanan Liu, Shuo Qiu, Shengzhou Hu, Weijian Zhang, Jinyue Xia:
Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain. Comput. Syst. Sci. Eng. 41(3): 1129-1142 (2022) - [j22]Lanlan Ni, Lanzheng Bian, Rugang Lu, Ting Chen, Jinyue Xia:
Early Rehabilitation of Orthopedic Internal Fixation Removal in Daytime Ward. Comput. Syst. Sci. Eng. 43(1): 219-231 (2022) - [j21]Chunpeng Ge
, Willy Susilo
, Joonsang Baek
, Zhe Liu, Jinyue Xia, Liming Fang
:
Revocable Attribute-Based Encryption With Data Integrity in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 2864-2872 (2022) - [j20]Chunpeng Ge
, Willy Susilo
, Joonsang Baek
, Zhe Liu, Jinyue Xia
, Liming Fang
:
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 2907-2919 (2022) - [c12]Xueqin Zhang, Xudong Wang, Jing Duan, Wei Chen, Xiaojun Sun, Jinyue Xia:
Operation Configuration Optimization of Power Gas Energy Hub System Considering NOx Emission. ICAIS (1) 2022: 28-40 - [c11]Qiulu Jiang, Wunan Wan, Zhi Qin, Jinquan Zhang, Hui Han, Shibin Zhang, Jinyue Xia:
Blockchain-Based Efficient Incentive Mechanism in Crowdsensing. ICAIS (3) 2022: 120-132 - [c10]Huailin Pu, Wunan Wan, Zhi Qin, Jinquan Zhang, Qiulu Jiang, Shibin Zhang, Jinyue Xia:
BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios. ICAIS (3) 2022: 133-143 - [c9]Zhe Li, Zhiwei Sheng, Wunan Wan, Shibin Zhang, Zhi Qin, Jinquan Zhang, Jinyue Xia:
Blockchain Cross-Chain Research Based on Verifiable Ring Signatures. ICAIS (3) 2022: 171-183 - [c8]Bo Zhang, Bin Lv, Liang Tang, Hongtao Qi, Yuanjie Zheng, Pin Wang, Shikang Zhang, Xiaowei Liang, Jinyue Xia:
Development of Intelligent Integrated Energy System Based on MVC. ICAIS (2) 2022: 289-299 - [c7]Min Hou, Shibin Zhang, Jinyue Xia:
Quantum Fuzzy K-Means Algorithm Based on Fuzzy Theory. ICAIS (1) 2022: 348-356 - 2021
- [j19]Wunan Wan, Jun Chen, Jinyue Xia, Jinquan Zhang, Shibin Zhang, Hao Chen:
Clustering Collision Power Attack on RSA-CRT. Comput. Syst. Sci. Eng. 36(2): 417-434 (2021) - [j18]Xizi Peng, Jinquan Zhang, Shibin Zhang, Wunan Wan, Hao Chen, Jinyue Xia:
A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain. Comput. Syst. Sci. Eng. 37(2): 265-281 (2021) - [j17]Jiang Xu, Ling Wang, Xinyu Liu, Xiujuan Feng, Yongjun Ren, Jinyue Xia:
Front-end Control Mechanism of Electronic Records. Comput. Syst. Sci. Eng. 39(3): 337-349 (2021) - [j16]Tao Li, Wenduo Xu, Lina Wang, Ningpeng Li, Yongjun Ren, Jinyue Xia:
An Integrated Artificial Neural Network-based Precipitation Revision Model. KSII Trans. Internet Inf. Syst. 15(5): 1690-1707 (2021) - [j15]Chunpeng Ge
, Zhe Liu
, Jinyue Xia
, Liming Fang
:
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 18(3): 1214-1226 (2021) - [j14]Chunpeng Ge
, Willy Susilo
, Zhe Liu, Jinyue Xia
, Pawel Szalachowski
, Liming Fang
:
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing. IEEE Trans. Dependable Secur. Comput. 18(6): 2787-2800 (2021) - 2020
- [j13]Jinqiao Dai, Shibin Zhang, Jinyue Xia:
A multi-group e-commerce signature scheme based on quantum teleportation. Int. J. Comput. Sci. Eng. 22(2/3): 243-251 (2020) - [j12]Lina Wang, Chaoyao Shen, Sheng Yuan, Yongjun Ren, Yong Wang, Jinyue Xia:
Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde. Int. J. Embed. Syst. 13(3): 341-351 (2020) - [j11]Liming Fang, Changchun Yin
, Lu Zhou, Yang Li, Chunhua Su
, Jinyue Xia:
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine. Inf. Sci. 507: 143-160 (2020) - [j10]Min Yang, Shibin Zhang, Hang Zhang, Jinyue Xia:
Corrigendum to "A New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 (2019) 102371. J. Inf. Secur. Appl. 50 (2020)
2010 – 2019
- 2019
- [j9]Chunpeng Ge
, Lu Zhou
, Jinyue Xia
, Pawel Szalachowski
, Chunhua Su
:
A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing. IEEE Access 7: 137266-137278 (2019) - [j8]Tao Li, Lei Wang, Yongjun Ren, Xiang Li, Jinyue Xia, Ran An:
An efficient method for meteorological nephogram recognition in cloud environment. EURASIP J. Wirel. Commun. Netw. 2019: 273 (2019) - [j7]Lina Wang, Chao Feng, Yongjun Ren, Jinyue Xia:
Local outlier detection based on information entropy weighting. Int. J. Sens. Networks 30(4): 207-217 (2019) - [j6]Yepeng Liu, Yongjun Ren, Chunpeng Ge, Jinyue Xia, Qirun Wang:
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system. J. Inf. Secur. Appl. 47: 125-131 (2019) - [j5]Min Yang, Shibin Zhang, Hang Zhang, Jinyue Xia:
A new user behavior evaluation method in online social network. J. Inf. Secur. Appl. 47: 217-222 (2019) - [j4]Wunan Wan, Jun Chen, Shibing Zhang, Jinyue Xia:
A Cluster Correlation power analysis against double blinding exponentiation. J. Inf. Secur. Appl. 48 (2019) - [c6]Zheng Tao
, Xiang Gao
, Shibin Zhang, Yan Chang, Jinyue Xia:
Multi-function Quantum Cryptography Protocol Based on Bell State. ICAIS (4) 2019: 110-119 - [c5]Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su:
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds. SocialSec 2019: 139-151 - 2018
- [j3]Liming Fang, Liang Liu
, Jinyue Xia, Maosheng Sun:
A Secure Multimedia Data Sharing Scheme for Wireless Network. Secur. Commun. Networks 2018: 5037892:1-5037892:10 (2018) - [j2]Chunpeng Ge
, Jinyue Xia, Aaron Wu, Hongwei Li, Yao Wang:
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network. Secur. Commun. Networks 2018: 6395362:1-6395362:8 (2018) - [c4]Jinyue Xia, David C. Wilson:
Instructor Perspectives on Comparative Heatmap Visualizations of Student Engagement with Lecture Video: Comparative Heatmap Visualizations of Student Video Engagement. SIGCSE 2018: 251-256 - 2014
- [c3]Jinyue Xia, Vikash Singh, David C. Wilson, Celine Latulipe
:
Exploring the design space of multiple video interaction. NordiCHI 2014: 276-285 - 2013
- [c2]Jinyue Xia, David C. Wilson:
Streamlining user interaction in tag-based conversational navigation of knowledge resource libraries. JCDL 2013: 423-424 - 2012
- [j1]Jinyue Xia, Yongge Wang
:
Secure Key Distribution for the Smart Grid. IEEE Trans. Smart Grid 3(3): 1437-1443 (2012)
2000 – 2009
- 2008
- [c1]Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM. CIS (1) 2008: 326-330 - [i3]Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM. IACR Cryptol. ePrint Arch. 2008: 139 (2008) - [i2]Liming Fang, Jinyue Xia:
Full Security: Fuzzy Identity Based Encryption. IACR Cryptol. ePrint Arch. 2008: 307 (2008) - [i1]Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian:
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols. IACR Cryptol. ePrint Arch. 2008: 479 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint